{"id":93409,"date":"2024-11-02T16:41:56","date_gmt":"2024-11-02T08:41:56","guid":{"rendered":"https:\/\/version-2.com\/?p=93409"},"modified":"2024-11-20T17:10:17","modified_gmt":"2024-11-20T09:10:17","slug":"etec-2024-prevention-first-success-second-an-eset-mdr-tale","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/11\/etec-2024-prevention-first-success-second-an-eset-mdr-tale\/","title":{"rendered":"ETeC 2024: Prevention first, Success second: An ESET MDR tale"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"93409\" class=\"elementor elementor-93409\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/ETeC_2024_ESET_MDR.png\" alt=\"\" width=\"250\" height=\"250\" \/><\/p><div><div id=\"content-c11086394\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>At the annual internal <strong>ESET Technology Conference 2024 (ETeC)<\/strong>, a series of high-powered workshops, seminars, hackathons, and presentations occurred.<\/p><p>ESET experts <strong>Gabriel Balla<\/strong> (product manager for Enterprise Solutions and Services), <strong>James Rodewald<\/strong> (security monitoring analyst), and <strong>Michal Hajovsky<\/strong> (global sales lead) provided a sneak peek into <a href=\"https:\/\/www.eset.com\/int\/business\/services\/managed-detection-and-response\/\" target=\"_blank\" rel=\"noopener\">ESET MDR<\/a> \u2013 its evolution, backend systems, delivery, as well as success stories demonstrating its ultimate value for businesses of all sizes.<\/p><\/div><div id=\"content-c11089678\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">The road to success with ESET MDR<\/h3><\/header><p>During the initial session with Gabriel Balla and James Rodewald, some of the most influential aspects of ESET MDR on business security, both past successes and future prospects, were discussed.<\/p><\/div><div id=\"content-c11089679\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Balla_profile.jpg\" alt=\"\" width=\"800\" height=\"533\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11089680\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>Balla began by describing a familiar situation many generalist IT admins face \u2013 an overabundance of tasks that heavily impact the overall quality of an organization\u2019s security, as admins have to contend with matters such as user support, various device maintenance, monitoring, and more \u2013 daily at that.<\/p><p>This is especially burdensome for small and medium-sized businesses (SMBs), which might lack:<\/p><ul><li><strong>Budget:<\/strong> SMBs have fewer resources to spend on high-level security and, as specialists are costly and not in abundance, they face tough competition from competitors with larger wallets.<\/li><li><strong>Time:<\/strong> An average EDR\/XDR solution might generate up to 160,000 detections for an SMB with just 250 seats. This requires lots of dedicated time and understanding to sort through, possibly resulting in <a href=\"https:\/\/www.eset.com\/blog\/business\/attention-alert-fatigue-can-result-in-severe-burnout\/\" target=\"_blank\" rel=\"noopener\">alert fatigue<\/a>.<\/li><li><strong>Knowledge:<\/strong> Identifying threats requires professional skills while understanding the newest threats targeting businesses is another heavy task altogether.<\/li><\/ul><p>While enterprises might not see these points as untenable, they have their specific issues, such as having a larger attack surface with multiple weak spots. Moreover, an enterprise requires finely-tuned preventive security, since the larger a business is, the more likely it is to face issues related to spotty coverage (missed devices) or compliance (country-specific regulations).<\/p><p>In fact, Rodewald later described a situation in which someone had purchased a security service but forgot to deploy it \u2013 which might sound comical, if not for its potential to end up causing a costly incident.<\/p><\/div><div id=\"content-c11089681\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">How to demonstrate the value of MDR within 30 days<\/h3><\/header><p>So, why would an SMB want an MDR service? Equally, why would an enterprise need something other than its own Security Operation Center (SOC)?<\/p><\/div><div id=\"content-c11089682\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Hajovsky_profile.jpg\" alt=\"\" width=\"800\" height=\"533\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11089683\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>Hajovsky easily answered these questions: \u201cAs much as 82% of ransomware attacks target SMBs. Businesses can break even with endpoint on, as threat actors can get in without using malware, just by <a href=\"https:\/\/www.welivesecurity.com\/2022\/09\/07\/rdp-radar-up-close-view-evolving-remote-access-threats\/\" target=\"_blank\" rel=\"noopener\">abusing RDP<\/a> or <a href=\"https:\/\/cybersecuritynews.com\/hackers-exploiting-ms-sql-servers\/\" target=\"_blank\" rel=\"noopener\">MS SQL<\/a>\u2026so the initial behavior is, therefore, crucial to monitor for,\u201d he said. Time to detect and respond is crucial. On average, the detection of malicious behavior in business systems takes around <a href=\"https:\/\/www.techtarget.com\/whatis\/34-Cybersecurity-Statistics-to-Lose-Sleep-Over-in-2020\" target=\"_blank\" rel=\"noopener\">277 days<\/a>, without any EDR\/XDR solution.<\/p><p>For an enterprise SOC, it should take around 16 hours, which is a lot better, but with MDR, this can all be done in less than 30 minutes, due to the way an MDR service is set up. Hajovsky also highlighted that many businesses don\u2019t have the time to dedicate their teams solely to security management. Likewise, with the need for constant education on novel threats, more expertise for threat hunting and incident remediation is required \u2013 which is often missing due to skills shortages.<\/p><p>However, ESET MDR, for example, is manned by <a href=\"https:\/\/www.eset.com\/int\/business\/kuppingercole-leadership-compass-mdr-2023\/\" target=\"_blank\" rel=\"noopener\">top experts<\/a> working with powerful in-house <a href=\"https:\/\/digitalsecurityguide.eset.com\/en-us\/the-toolbox-of-a-soc-team-siem-and-soar\" target=\"_blank\" rel=\"noopener\">SOAR\/SIEM<\/a> tools ingesting data from multiple points, using a dash of AI-native power, <a href=\"https:\/\/www.welivesecurity.com\/en\/about-eset-research\/\" target=\"_blank\" rel=\"noopener\">ESET research<\/a>, and actionable <a href=\"https:\/\/www.eset.com\/blog\/enterprise\/prevention-first-security-begins-with-data-enhanced-insight-meet-eset-threat-intelligence\/\" target=\"_blank\" rel=\"noopener\">threat intelligence<\/a> to empower fast proactive threat detection and threat hunting. Additional value can also be found in <a href=\"https:\/\/www.eset.com\/int\/business\/cybersecurity-compliance-for-business\/\" target=\"_blank\" rel=\"noopener\">satisfying compliance<\/a> and insurance requirements \u2013 often asking for EDR\/XDR for lower premiums or as a condition.<\/p><p class=\"alert\">Don\u2019t believe it? <a href=\"https:\/\/www.eset.com\/int\/business\/services\/contact\/\" target=\"_blank\" rel=\"noopener\">Try<\/a><a href=\"https:\/\/www.eset.com\/int\/business\/services\/contact\/\" target=\"_blank\" rel=\"noopener\"> i<\/a>t. ESET offers an <strong>ESET MDR Trial<\/strong> that can demonstrate its power shortly after deployment \u2013 so if the prospects are that you\u2019re not ready to buy, you are most probably ready to try \ud83d\ude42<\/p><\/div><div id=\"content-c11089684\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">ESET MDR success stories<\/h3><\/header><p>Rodewald dedicated his side of the ESET MDR tale to describing successes \u2013 in detail.<\/p><\/div><div id=\"content-c11089685\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Rodewald_profile.jpg\" alt=\"\" width=\"800\" height=\"533\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11089686\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>In one success story, ESET MDR operators noticed that odd-looking user accounts had started to appear, each added to local administrators. This was being done by a mesh agent (an open-source <a href=\"https:\/\/help.eset.com\/eea\/8\/en-US\/idh_config_ermm.html\" target=\"_blank\" rel=\"noopener\">RMM<\/a> tool for network management), which is not usually malicious. However, the mesh agent had been installed in a <em>c2Update<\/em> folder (sounding suspiciously like a <a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/command-and-control-server-CC-server\" target=\"_blank\" rel=\"noopener\">C&amp;C server<\/a>) by <em>notepad.exe<\/em> running from <em>ProgramData<\/em> \u2013 signaling malicious activity.<\/p><\/div><div id=\"content-c11089687\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Abused_management_agent_3_logo_blur.png\" alt=\"\" width=\"800\" height=\"450\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11089688\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>When a user account started to perform more actions, such as trying to create a <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/What-reverse-shell-attacks-are-and-how-to-prevent-them\" target=\"_blank\" rel=\"noopener\">reverse shell<\/a>, or dropping an EXE (doing a <a href=\"https:\/\/thehackernews.com\/2024\/07\/new-ransomware-group-exploiting-veeam.html\" target=\"_blank\" rel=\"noopener\">CVE in Veeam software<\/a> to dump backups) immediately detected and deleted by ESET, the intent became clear: \u201cI suspect that this was likely the beginning of a ransomware or extortionware attack, since we have seen mesh agents used in the US to deploy ransomware,\u201d said Rodewald.<\/p><\/div><div id=\"content-c11089689\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Abused_management_agent_2_logo.png\" alt=\"\" width=\"800\" height=\"450\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11089690\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>In another success story, ESET analysts saw <em>EsetIpBlacklist<\/em> detected on a port that was actively used by an <em>sqlserver.exe<\/em> process, exposed to the internet. The same process was compromised by an outside connection, logging into <a href=\"https:\/\/learn.microsoft.com\/en-us\/sql\/sql-server\/what-is-sql-server?view=sql-server-ver16\" target=\"_blank\" rel=\"noopener\">MS SQL<\/a>, making themselves into an admin, and starting to execute commands on the OS. The MDR team acted quickly. \u201cThe best course of action was to isolate the device \u2013 by cutting them off, they weren\u2019t able to execute new commands,\u201d elaborated Rodewald.<\/p><\/div><div id=\"content-c11089691\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/MSSQL_compr_logo.png\" alt=\"\" width=\"800\" height=\"450\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11089692\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>Upon further analysis, the team discovered that the MS SQL server command tried to create a PowerShell script named <em>updt.ps1<\/em> (downloading a file saved as <em>tzt.bat<\/em>) and execute it with <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/wmisdk\/wmi-start-page\" target=\"_blank\" rel=\"noopener\">WMI<\/a>. \u201cThis breaks the process tree a little bit, so without an <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/xdr-extended-detection-and-response\/\" target=\"_blank\" rel=\"noopener\">EDR solution<\/a> capable of connecting it back together, it wouldn\u2019t look like MS SQL did anything.\u201d<\/p><\/div><div id=\"content-c11089693\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/MSSQL_attribution_logo.png\" alt=\"\" width=\"800\" height=\"450\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11089694\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>After additional research, the team was able to attribute the latter attack to a case of <a href=\"https:\/\/thehackernews.com\/2023\/07\/mallox-ransomware-exploits-weak-ms-sql.html\" target=\"_blank\" rel=\"noopener\">Mallox Ransomware<\/a>. \u201cWe stopped the attack before it was able to drop an EXE payload just in its initial stages as it was exploring if it could get the <em>.bat<\/em> file to run. This means that ESET MDR was able to <em>prevent ransomware<\/em> for a customer, that is a huge success as I see it,\u201d Rodewald concluded.<\/p><\/div><div id=\"content-c11089695\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Prevention first with ESET MDR<\/h3><\/header><p>According to <a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-threat-report-h12024.pdf\" target=\"_blank\" rel=\"noopener\">ESET telemetry<\/a>, ransomware attacks rose by 32% in H1 2024, compared to the previous semester. This comes in tandem with large-scale compromises of small and large businesses and critical infrastructure (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-attack-forces-umc-health-system-to-divert-some-patients\/\" target=\"_blank\" rel=\"noopener\">such as hospitals<\/a>), highlighting a growing problem.<\/p><p>However, sophisticated threats, such as ransomware, are exactly what services like ESET MDR thrive on. They fulfill the notions of a <a href=\"https:\/\/www.eset.com\/int\/prevention-first-approach\/\" target=\"_blank\" rel=\"noopener\">prevention-first security approach<\/a> by stealthily working in the background to let businesses keep ahead of threats without disrupting their processes.<\/p><p>The main takeaway, as pointed out by Gabriel Balla, should be security success without worry, free from constant notifications about detection or remediation efforts. That is the way of ESET MDR, so let ESET take care of you, and live a life full of green checkmarks indicating that everything is secure in your world.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>At the annual internal ESET Technology Conference 2024  [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[41,1272],"class_list":["post-93409","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-eset","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ETeC 2024: Prevention first, Success second: An ESET MDR tale - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ETeC 2024: Prevention first, Success second: An ESET MDR tale - Version 2\" \/>\n<meta property=\"og:description\" content=\"At the annual internal ESET Technology Conference 2024 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-02T08:41:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-20T09:10:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/ETeC_2024_ESET_MDR.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/etec24-prevention-first-success-second-an-eset-mdr-tale\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/etec-2024-prevention-first-success-second-an-eset-mdr-tale\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"ETeC 2024: Prevention first, Success second: An ESET MDR tale\",\"datePublished\":\"2024-11-02T08:41:56+00:00\",\"dateModified\":\"2024-11-20T09:10:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/etec-2024-prevention-first-success-second-an-eset-mdr-tale\\\/\"},\"wordCount\":1150,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/etec24-prevention-first-success-second-an-eset-mdr-tale\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/ETeC_2024_ESET_MDR.png\",\"keywords\":[\"ESET\",\"2024\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/etec24-prevention-first-success-second-an-eset-mdr-tale\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/etec-2024-prevention-first-success-second-an-eset-mdr-tale\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/etec24-prevention-first-success-second-an-eset-mdr-tale\\\/\",\"name\":\"ETeC 2024: Prevention first, Success second: An ESET MDR tale - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/etec24-prevention-first-success-second-an-eset-mdr-tale\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/etec24-prevention-first-success-second-an-eset-mdr-tale\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/ETeC_2024_ESET_MDR.png\",\"datePublished\":\"2024-11-02T08:41:56+00:00\",\"dateModified\":\"2024-11-20T09:10:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/etec24-prevention-first-success-second-an-eset-mdr-tale\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/etec24-prevention-first-success-second-an-eset-mdr-tale\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/etec24-prevention-first-success-second-an-eset-mdr-tale\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/ETeC_2024_ESET_MDR.png\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/ETeC_2024_ESET_MDR.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/etec24-prevention-first-success-second-an-eset-mdr-tale\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ETeC 2024: Prevention first, Success second: An ESET MDR tale\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ETeC 2024: Prevention first, Success second: An ESET MDR tale - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/","og_locale":"en_US","og_type":"article","og_title":"ETeC 2024: Prevention first, Success second: An ESET MDR tale - Version 2","og_description":"At the annual internal ESET Technology Conference 2024 [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/","og_site_name":"Version 2","article_published_time":"2024-11-02T08:41:56+00:00","article_modified_time":"2024-11-20T09:10:17+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/ETeC_2024_ESET_MDR.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/11\/etec-2024-prevention-first-success-second-an-eset-mdr-tale\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"ETeC 2024: Prevention first, Success second: An ESET MDR tale","datePublished":"2024-11-02T08:41:56+00:00","dateModified":"2024-11-20T09:10:17+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/11\/etec-2024-prevention-first-success-second-an-eset-mdr-tale\/"},"wordCount":1150,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/ETeC_2024_ESET_MDR.png","keywords":["ESET","2024"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/11\/etec-2024-prevention-first-success-second-an-eset-mdr-tale\/","url":"https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/","name":"ETeC 2024: Prevention first, Success second: An ESET MDR tale - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/ETeC_2024_ESET_MDR.png","datePublished":"2024-11-02T08:41:56+00:00","dateModified":"2024-11-20T09:10:17+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/ETeC_2024_ESET_MDR.png","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/ETeC_2024_ESET_MDR.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/business\/etec24-prevention-first-success-second-an-eset-mdr-tale\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"ETeC 2024: Prevention first, Success second: An ESET MDR tale"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-oiB","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/93409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=93409"}],"version-history":[{"count":10,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/93409\/revisions"}],"predecessor-version":[{"id":97927,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/93409\/revisions\/97927"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=93409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=93409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=93409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}